Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:42
Static task
static1
Behavioral task
behavioral1
Sample
c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe
Resource
win10v2004-20230220-en
General
-
Target
c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe
-
Size
690KB
-
MD5
1e7ceb0b1064b1fdc5dd4b8be3e95e4a
-
SHA1
3ab6284f675ae11659e4be914d639a6a915ce670
-
SHA256
c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748
-
SHA512
4a59c1152950d0337e6072cd23ff62023eac87a4f0d7f9bb8298ab962184c305b5282c51ce7c0ce2079188cd10d9a7316abf177b4459d35e500d851d58cb931b
-
SSDEEP
12288:qMr0y90OCq2LqjFNQGH7CpLARW3GbZ9+LD4v/vNFg1figTMG/BgOlms:6yK2jFNKpsMG6D4v/fg1agTMOlms
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6380.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6380.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6380.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3872-190-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-193-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-191-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-195-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-197-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-201-0x0000000006140000-0x0000000006150000-memory.dmp family_redline behavioral1/memory/3872-200-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-203-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-204-0x0000000006140000-0x0000000006150000-memory.dmp family_redline behavioral1/memory/3872-206-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-208-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-210-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-212-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-214-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-216-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-218-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-220-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-222-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-224-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/3872-226-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un735184.exepro6380.exequ0163.exesi574696.exepid process 892 un735184.exe 1752 pro6380.exe 3872 qu0163.exe 3280 si574696.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6380.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6380.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exeun735184.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un735184.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un735184.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1400 1752 WerFault.exe pro6380.exe 4748 3872 WerFault.exe qu0163.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6380.exequ0163.exesi574696.exepid process 1752 pro6380.exe 1752 pro6380.exe 3872 qu0163.exe 3872 qu0163.exe 3280 si574696.exe 3280 si574696.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6380.exequ0163.exesi574696.exedescription pid process Token: SeDebugPrivilege 1752 pro6380.exe Token: SeDebugPrivilege 3872 qu0163.exe Token: SeDebugPrivilege 3280 si574696.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exeun735184.exedescription pid process target process PID 5036 wrote to memory of 892 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe un735184.exe PID 5036 wrote to memory of 892 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe un735184.exe PID 5036 wrote to memory of 892 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe un735184.exe PID 892 wrote to memory of 1752 892 un735184.exe pro6380.exe PID 892 wrote to memory of 1752 892 un735184.exe pro6380.exe PID 892 wrote to memory of 1752 892 un735184.exe pro6380.exe PID 892 wrote to memory of 3872 892 un735184.exe qu0163.exe PID 892 wrote to memory of 3872 892 un735184.exe qu0163.exe PID 892 wrote to memory of 3872 892 un735184.exe qu0163.exe PID 5036 wrote to memory of 3280 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe si574696.exe PID 5036 wrote to memory of 3280 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe si574696.exe PID 5036 wrote to memory of 3280 5036 c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe si574696.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe"C:\Users\Admin\AppData\Local\Temp\c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 10804⤵
- Program crash
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 18484⤵
- Program crash
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1752 -ip 17521⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3872 -ip 38721⤵PID:440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56dc6d4152b393dc8565609d891123c4e
SHA1f098e061f15cef2b48f3f4c5db8428ad9ece5b06
SHA256f92f97e4afc819e3a665795b24a3ac711ff25bda92b27fe0cfaa2ee882904609
SHA5129eb43bc70e47be4b171e0a13263f62d2dacc0718dbed4205d9d6abe7ebdeb9ed7fc511bc0b169a2c5ae9003753788657425a4b91682015524a8b17888a9e2419
-
Filesize
175KB
MD56dc6d4152b393dc8565609d891123c4e
SHA1f098e061f15cef2b48f3f4c5db8428ad9ece5b06
SHA256f92f97e4afc819e3a665795b24a3ac711ff25bda92b27fe0cfaa2ee882904609
SHA5129eb43bc70e47be4b171e0a13263f62d2dacc0718dbed4205d9d6abe7ebdeb9ed7fc511bc0b169a2c5ae9003753788657425a4b91682015524a8b17888a9e2419
-
Filesize
548KB
MD525c795085d6a3671fca4f0e9f3b8f4d9
SHA17f55aa236541184c63c49aedafaf5dda66910958
SHA25618580d3351f68d2abf52b7ff9de9d7f68c7663935bb7267576a53de22a2ae9b9
SHA51224b9d03d04fb8d5c755be7031a2659626d123d72b6e712d5b6c61efb069faa9f2bdb5b3c1cb9a49055fe12bdfafdfb107fcd80f8cd5b6ae850d39ff4524f0340
-
Filesize
548KB
MD525c795085d6a3671fca4f0e9f3b8f4d9
SHA17f55aa236541184c63c49aedafaf5dda66910958
SHA25618580d3351f68d2abf52b7ff9de9d7f68c7663935bb7267576a53de22a2ae9b9
SHA51224b9d03d04fb8d5c755be7031a2659626d123d72b6e712d5b6c61efb069faa9f2bdb5b3c1cb9a49055fe12bdfafdfb107fcd80f8cd5b6ae850d39ff4524f0340
-
Filesize
291KB
MD57e6c8abc4e1a5549b1d0a9a049bf6b2f
SHA1804049202f5a33365f3dd78971e16895c1b153fe
SHA25652ac98c48b500c2724fbcdf19a72461c5419a4ef3cf7d60d17fc528b998ec79f
SHA512ae58c0108835af018fffc7fa242cf01bf52b1bb7c3cd7f96664570f1fe7a87b533e3a895041462574c6a6df9a087fa30a197be13f9404be9dcfc104f733c9297
-
Filesize
291KB
MD57e6c8abc4e1a5549b1d0a9a049bf6b2f
SHA1804049202f5a33365f3dd78971e16895c1b153fe
SHA25652ac98c48b500c2724fbcdf19a72461c5419a4ef3cf7d60d17fc528b998ec79f
SHA512ae58c0108835af018fffc7fa242cf01bf52b1bb7c3cd7f96664570f1fe7a87b533e3a895041462574c6a6df9a087fa30a197be13f9404be9dcfc104f733c9297
-
Filesize
345KB
MD52c4b34e6da86e2aeb24ab2b579314cdf
SHA13a2a8dc3d87dc1c6b5304a56aabf3ce17c055a85
SHA256619fb0bd44b859b06b96e6b826bcd47672f73f20b4c23edad954f57c4558f23e
SHA5122cdc2f51a91af6178481688371916ba24251919935e40a7f5a9aefc3cce1a0bded8b4c250ac7886c02b2082c22fc37f790c8a7e5369626b20e69b1463f1fbddf
-
Filesize
345KB
MD52c4b34e6da86e2aeb24ab2b579314cdf
SHA13a2a8dc3d87dc1c6b5304a56aabf3ce17c055a85
SHA256619fb0bd44b859b06b96e6b826bcd47672f73f20b4c23edad954f57c4558f23e
SHA5122cdc2f51a91af6178481688371916ba24251919935e40a7f5a9aefc3cce1a0bded8b4c250ac7886c02b2082c22fc37f790c8a7e5369626b20e69b1463f1fbddf